Voice over IP (VoIP) upgrades are the clear choice for businesses that want to cut telecommunications costs and improve customer service. It’s a versatile technology with incredible customizability, and although we do most of the work for you, it’s important to understand the difference between proprietary and open-source systems.

Voice over IP (VoIP) upgrades are the clear choice for businesses that want to cut telecommunications costs and improve customer service. It’s a versatile technology with incredible customizability, and although we do most of the work for you, it’s important to understand the difference between proprietary and open-source systems.

What are “proprietary” systems?

When most companies release VoIP software, such as Microsoft’s Skype, they often package it in a way that makes it almost impossible for users to view or alter the programming code. By keeping it locked down, they can retain control over which hardware and software systems it is compatible with and prevent hackers from uncovering vulnerabilities.

Pros and cons

One of the biggest benefits of a proprietary VoIP system is a consistent user experience across compatible hardware devices and software integrations. Brand-name handsets and third-party software must be programmed by the VoIP system’s developer to be compatible, so you know everything will be optimized for a uniform and reliable user experience.

But keep in mind that, in the majority of cases, the added security and polished integrations of these systems cost more than open-source alternatives.

What are “open-source” systems?

The programming code that enables open-source VoIP solutions to work is free and accessible to anyone. Open-source systems are made to be more of a starting point than a finished solution, which means they’re usually pretty rough around the edges until you customize them.

Pros and cons

The two best things about an open-source system are the cost and the flexibility. The core system will be totally free, but tailoring it to your desktops, handsets, and servers will require a fair amount of time and technical expertise. This usually requires a larger upfront investment when compared to proprietary systems, but will pay off with lower operational costs as time goes on.

The tradeoffs between open-source and proprietary systems are fairly even. The former is often better for business owners who prioritize keeping costs low, while the latter is usually better for those who prefer refined solutions. Choosing between the two comes down to your customer service model, IT resources, and business priorities.

Small businesses like yours can enjoy personalized, high-end IT solutions, they just need support from experienced technicians. With years of experience in VoIP, we’re the answer to all your problems. To learn about what we think is best for your business, call today!

Microsoft recently announced that it’s revamping Outlook’s user interface and improving certain features. The redesign is aimed at decluttering the desktop version and align it with the much cleaner and more user-friendly iOS version. Mac and Windows users can look forward to a sleeker design, better features, and reduced complexity.

Microsoft recently announced that it’s revamping Outlook’s user interface and improving certain features. The redesign is aimed at decluttering the desktop version and align it with the much cleaner and more user-friendly iOS version. Mac and Windows users can look forward to a sleeker design, better features, and reduced complexity.

How Outlook will be simplified

The most notable feature of the new Outlook will be a simplified navigation bar along the top of the screen, which means less of the screen will be reserved for formatting and organizational options. However, you can still add more buttons to accommodate your common tasks and preferences. With a smaller number of commands, you can benefit from an uncluttered interface that lets you use email more efficiently.

Changes will also be made to the left panel to provide users with quicker access to folders across multiple accounts. Moreover, a slide-to-delete function using Apple’s trackpad -- like in the iOS version -- will be integrated into the redesigned app.

Other design changes for Outlook in Mac

Mac users can also expect faster and more reliable search and calendar features in the enhanced Outlook. The search function will get a performance boost and will be moved to the top right corner of the app for easier access. The calendar function’s interface, on the other hand, will be reworked to eliminate tedious steps currently required to manage appointments.

These and other upcoming changes are aimed at increasing users’ satisfaction ‘by providing a cleaner, more modern way to email.’ The design changes will also benefit those who access their account on different devices because, in the updated desktop version, they will be able to enjoy the same uncluttered app that they use on their mobile devices.

Although the changes are for Windows and Mac, Microsoft is implementing most of the design changes primarily for Mac. Microsoft recognizes Outlook's popularity among “key influencers and decision makers,” whom it wishes to win over before a wider release. The new version will most likely become available to Office 365 subscribers first and eventually roll out with Office 2019, which is expected to arrive in mid-2018.

An easy-to-use email interface is a boon to your business’s productivity. And with Outlook’s new look and improved functionality, you can read, send, and organize emails more conveniently and with minimal distraction. Our experts are on-hand to answer all your questions about Outlook and other Microsoft Office apps -- get in touch with us today.

Whether you’ve lost an employee or are looking to bring in extra help, you need to get your job listings posted on the right platform. If you’re not finding any luck with the process so far, Google for Jobs might be your four-leaf clover.

What is it?

Google for Jobs is a search feature that sorts and prominently displays job listings from career sites in Google Search.

Whether you’ve lost an employee or are looking to bring in extra help, you need to get your job listings posted on the right platform. If you’re not finding any luck with the process so far, Google for Jobs might be your four-leaf clover.

What is it?

Google for Jobs is a search feature that sorts and prominently displays job listings from career sites in Google Search. It allows anyone looking for a job to access listings using different filters such as position and city, and apply directly from Google for Jobs instead of having to visit different websites.

How will it benefit your company?

Since Google for Jobs lets candidates search for positions using filters like location and expertise, employers can in turn find people who meet their criteria quite easily.

Along with your job listings, it also displays your company logo, reviews, ratings, and salary range estimates, which can be used by candidates. This not only boosts your company’s online exposure, but also helps persuade candidates to apply too.

Other than Google for Jobs, applicants are also able to choose which service they want to use to apply. For example, if they’re interested in a job opening from LinkedIn and already have a profile there, they can simply apply via LinkedIn.

Google has also revealed that a bookmark button that allows users to save jobs right in Google search will be introduced soon. These integrations might not seem so useful, but they’ll definitely help make the whole process easier for you and potential candidates.

How to get your job openings on Google for Jobs?

The first option is to use a third-party job site. All you need is to post on job boards that are integrated with Google job search engine. These include Facebook, LinkedIn, Glassdoor, ZipRecruiter, Snagajob, Monster, and Jibe, among others. Once you have that, Google will automatically retrieve your postings and all the details to be shown in Google for Jobs.

The second option is to integrate directly with Google, in which case you’ll need to edit the HTML of your job postings’ website so Google can index your postings. Here’s how:

Your passwords are the gateway to your files, money, and identity, so it’s no surprise that hackers are constantly trying to steal them. Most cybercriminals will use malware to do the trick, but they also have other means at their disposal. Google’s year-long security investigation provides the details.

Your passwords are the gateway to your files, money, and identity, so it’s no surprise that hackers are constantly trying to steal them. Most cybercriminals will use malware to do the trick, but they also have other means at their disposal. Google’s year-long security investigation provides the details.

The results
From March 2016 to March 2017, Google and UC Berkeley researchers examined three main ways hackers hijack accounts:

In just one year, Google found 788,000 successful keylogging attacks, 12.4 million victims of phishing attacks, and 1.9 billion accounts exposed via login credentials sold on the black market.

Researchers suggest the reason so many accounts are hacked is because people tend to reuse their passwords, which means if one set of login credentials is exposed, other accounts could be compromised.

Phishing is also a big threat because it targets users -- the weakest links in your cybersecurity. The strongest password or security system won’t mean anything if your employees constantly fall for online scams.

Protecting your accounts
There are several things you can do thwart account hijacking. For starters, you should set strong and unique passwords for each account to minimize data breaches.

While the general rule in the past was to set a complex password -- a mix of letters, numbers, and symbols -- recent studies suggest that longer, 20-character “passphrases” are much tougher to crack. If you find it difficult to remember several passwords, consider using a password manager, which not only stores all your passwords, but can generate strong passwords, too.

To deal with phishing attacks, you should activate multi-factor authentication on your accounts. This adds an extra layer of identity verification to your password (e.g., a fingerprint scan or a temporary security key sent to your phone), making your login details ‘unphishable.’

Security training is also crucial. This includes teaching your employees about what phishing attacks look like and instructing them on password protection best practices so they never fall victim to account hijacking.

The bottom line is not only that strong password security requires strong defense mechanisms; you and your employees must be vigilant, too.

Need more advice on keeping your business safe? Call us today! We provide critical security updates and comprehensive support services to help you stay well ahead of cybercriminals.

For most people, Google is the first stop when searching for a specific business. And in some cases -- like searches for gyms and beauty salons -- people are using Google to help them contact the business about an appointment. Now, the search giant has made that possible right from its results pages.

For most people, Google is the first stop when searching for a specific business. And in some cases -- like searches for gyms and beauty salons -- people are using Google to help them contact the business about an appointment. Now, the search giant has made that possible right from its results pages.

How to edit your business’s Google listing

When someone types your business’s name and location into Google.com, a “Knowledge Panel” is displayed on the righthand side of the search results with information about your office. If your business doesn’t have a Knowledge Panel, you can change that by opening a free Google My Business (GMB) account.

The GMB platform lets you link to your website, update office information (address, hours, phone number, etc.) and choose which photos Google associates with your company. GMB also gives you data about how many people:

Saw your business’s Knowledge Panel in search results

Visited your website by clicking somewhere in the Knowledge Panel

Asked for directions via the Knowledge Panel

What’s new with GMB?

In the summer of 2017, Google announced that business owners could customize “Posts” in their Knowledge Panel. Posts are made up of a 100-300 word caption, an image and a call-to-action button, such as Learn More, Sign Up, Buy, etc. Posts automatically expire after seven days, which makes them perfect for sales, events and content marketing.

More recently, Google added another exciting feature: the ability to schedule appointments from inside the Knowledge Panel. If your website uses one of the 22 accepted plugins, you can connect it with GMB to make it easier for searchers to book a reservation at your location. Google is in the process of rolling out this feature to gyms, beauty salons and restaurants, but a wider release is on the way.

How do I enable Bookings?

Choose your booking provider from the list of approved vendors and sign up on its site

Check back in a few days and start tracking your appointments with GMB!

If your business accepts reservations, this feature will be an indispensable tool for improving your customers’ experiences. For more information on low-cost technology solutions that add value to your business -- give us a call today.

For ages, most people assumed that setting a strong password on their WiFi router was enough to prevent cyberattacks, but recent events prove otherwise. Two Belgian security analysts have found a serious weakness in WiFi networks, called KRACK, that puts your wireless devices in danger.

For ages, most people assumed that setting a strong password on their WiFi router was enough to prevent cyberattacks, but recent events prove otherwise. Two Belgian security analysts have found a serious weakness in WiFi networks, called KRACK, that puts your wireless devices in danger.

What is KRACK?
Simply put, KRACK, short for ‘key reinstallation attack,’ allows hackers to bypass WPA2 -- a security protocol used by routers and devices to encrypt activity -- and intercepts sensitive data passing between the mobile device and the wireless router, including login details, credit card numbers, private emails, and photos.

In extreme cases, KRACKed devices can be remotely controlled. For example, hackers can log in to your surveillance systems and shut them down.

What’s worse, Internet of Things devices -- like smart thermostats and IP cameras -- rarely receive security fixes, and even if some are available, applying patches are difficult, as these devices tend to have complex user interfaces.

The good news, however, is you can do several things to mitigate the risks.

Download patches immediately
According to recent reports, security patches have already been released for major platforms, including iOS, Windows, and Android. Router manufacturers such as Ubiquiti, Mikrotik, Meraki, and FortiNet have also issued firmware updates, so make sure to install them as soon as possible.

Although IoT patches are rare, consider getting your smart devices from reputable vendors that push out updates regularly. It’s also a good idea to contact a managed services provider to install the updates for you.

Use Ethernet connections
Some wireless routers don’t yet have a security patch, so while you’re waiting, use an Ethernet cable and disable your router’s wireless setting. Turn off the WiFi on your devices as well to make sure you’re not connecting to networks susceptible to KRACK.

Stay off public networks
Free public WiFi networks -- even ones that are password-protected -- in your local cafe should also be avoided because they usually don’t have holistic security measures in place, making them easy targets for cybercriminals.

Connect to HTTPS websites
If you do need to connect to a public WiFi hotspot, visit websites that start with “HTTPS,” and stay away from ones that are prefaced with “HTTP.” This is because HTTPS websites encrypt all traffic between your browser and the website, regardless of whether the connection is vulnerable to KRACK

Hop on a Virtual Private Network (VPN)
You can also use a VPN service to hide all network activity. Simply put, VPNs encrypt your internet connection so that all the data you’re transmitting is safe from prying eyes.

Although the potential impact of a KRACK hack is devastating, security awareness and top-notch support are the best ways to stay safe online. Want more security tips? Contact us today.

Mark Zuckerberg and Elon Musk are not the only ones dabbling with AI and machine learning. According to Cisco, these technologies might be key to the future of IT system management and business continuity, both of which have grown increasingly complex over the years.

Mark Zuckerberg and Elon Musk are not the only ones dabbling with AI and machine learning. According to Cisco, these technologies might be key to the future of IT system management and business continuity, both of which have grown increasingly complex over the years.

Artificial intelligence (AI) and machine learning are extremely useful in helping us sift through massive amounts of information, and networking behemoth Cisco recently announced that they will be incorporating these technologies with two of their services.

Business Critical Services

This suite of services uses AI-powered automation, compliance, security, and machine learning analytics tools to reduce the complexity of IT systems management. It helps monitor the health of your business services and mitigate risks via automated compliance and remediation audits.

You can also replicate your network to improve reliability between your hardware and software components, and deploy features with automation capabilities.

Cisco High Value Services

This product support model provides network, software, and solution support using advanced analytics and best practices to access infrastructure performance and remediate issues. Cisco aims to improve business continuity and reduce resource constraints withremote monitoring, automated incident detection, and high SLAs.

Some of the services you can expect include software analysis, workflow integration, customer benchmarking, and predictive network analysis.

Using cutting-edge technologies as well as networking and hardware expertise, Cisco is gearing up its attempt to predict IT failures before they happen. That said, we assume it’s only a matter of time before other major developers follow suit, and when they do, you’ll be the first to know.

If you’d like to learn more about how to predict IT failures before they happen, or stay protected and operational when they do, just give us a call.

Stop transferring files from your full local hard disk and start working -- this seems to be Dropbox’s new tagline for its newly launched feature, Smart Sync. It promises to rid you of the constant worry of limited disk space. Read on to learn more.

Stop transferring files from your full local hard disk and start working -- this seems to be Dropbox’s new tagline for its newly launched feature, Smart Sync. It promises to rid you of the constant worry of limited disk space. Read on to learn more.

Stop worrying about storage space

Gone are the days when you have to regularly remove, relocate, or reorganize files stored on your hard disk because there’s not enough space. Dropbox has recently introduced a new plan, Dropbox Professional, aimed at self-employed professionals and entrepreneurs. And it comes with a new feature called Smart Sync.

Smart Sync allows you to choose any file or folder stored in your computer's Dropbox folder and send it to the cloud, thus freeing your hard disk space.

What's great about this feature is that all the “online-only” files and folders will still be visible on your desktop, allowing for convenient access. You can view, rename, remove, or preview those files and folders easily from your computer, just like you can for regular files.

It also comes with an array of extra features, such as advanced sharing controls that include remote device wipe, password-protected and expiring shared links, detailed viewer history, and priority support with the Dropbox support team.

Let’s welcome Showcase

Another exciting feature of Dropbox Professional is Showcase. Instead of organizing your files in a traditional folder, now you can arrange them on a “branded page” with customized layouts, captions, visual preview and show them to the world. This PowerPoint-like page is a great tool for designers, marketeers, or any entrepreneurs who have to present their work to potential clients.

You can also see who viewed your file, as well as how they might have interacted with it (e.g., by downloading and/or commenting whatever work your share).

Any type of file can be shown on Showcase except video files which, for now, can be presented only as a static image. Dropbox will roll out a support for this soon. And the good news is: Showcase doesn’t take up your Dropbox space.

Pricing

$19.99 a month or $199 a year is the price you have to pay for Dropbox Professional and its extras. The plan comes with 1TB storage and allows you to recover old versions or restore deleted files from the last 120 days.

Let’s see whether the new Dropbox plan can compete with other cloud-storing products in the market, including Box.com, which costs only $15 a month (but has fewer features).

Using productivity apps is one way to help you become more efficient. But there are also many other ways in which technology can help improve your efficiency. Why not contact our IT team today? Our staff knows how to turn technology to your advantage, and they’ll be more than happy to talk to you!

]]>The right way to set up guest Wi-Fihttp://www.layer3.biz/2017/10/right-way-set-guest-wi-fi/
Fri, 27 Oct 2017 20:00:01 +0000http://layer3.bypronto.com/?p=1892

Customers, partners, and vendors expect internet access when they’re visiting someone else’s office. This is why guest Wi-Fi access is so common. But setting it up the wrong way can create a frustrating experience for people looking to connect and leave your company exposed to attacks.

Customers, partners, and vendors expect internet access when they’re visiting someone else’s office. This is why guest Wi-Fi access is so common. But setting it up the wrong way can create a frustrating experience for people looking to connect and leave your company exposed to attacks. Here’s how to do it right.

Never give guests access to your primary Wi-Fi

While giving guests password to your company’s main Wi-Fi might be the easiest way to get them connected, you should avoid this at all costs.

Anyone with a little technical know-how can potentially access everything on your company network, including confidential data. Not to mention, guests’ devices connected to your business network increase the risk of a malware infection or cyber attack since you can never be sure that they’re safe and secure.

Ways to create secondary Wi-Fi for guests

If you router has built-in guest Wi-Fi support (you can check this feature through a quick web search) you could use it to create a separate “virtual” network. This means guests will have access to the internet without connecting to your main company network.

If your router doesn’t support multiple Wi-Fi networks, you can implement a separate wireless access point that bypasses the rest of your network and connects directly to your Internet service provider (ISP) connection.

Both options will keep your guests’ connectivity separate from your company network so you’ll never have to worry about unauthorized persons accessing your company data.

Keep in mind that guest Wi-Fi still uses your ISP connection so you should limit bandwidth usage on your guest network. The last thing you want is a guest streaming videos that slow down the Internet for your employees. With that in mind, you can even have your employees use guest Wi-Fi for their personal devices too. This minimizes the chance of employees hogging company bandwidth for personal use.

Your guest Wi-Fi should only provide outsiders with internet access, nothing more. While proper setup isn’t rocket science, it can be a tedious process. Having said that, if you need a team of experts to take care of it all for you, or simply have questions about how else to leverage your hardware for better efficiency and security, just give us a call.

With cybersecurity threats targeting small and large businesses, solutions that protect mobile devices are no longer a niche service. More work is being handled away from the office, which means more opportunities for security breaches. Virtualization vendors are leading the charge to tackle these challenges with innovative solutions.

With cybersecurity threats targeting small and large businesses, solutions that protect mobile devices are no longer a niche service. More work is being handled away from the office, which means more opportunities for security breaches. Virtualization vendors are leading the charge to tackle these challenges with innovative solutions.

Mobile device management and virtualization

For example, if you have a user who accesses data via a company-provided laptop, an office copier and a personal smartphone, IT administrators can install an application on each device that enforces policies created from a centralized console.

There are dozens of standalone MDM solutions that consolidate device administration, but by using one that integrates with your virtualization platform, you can standardize policies for any industry across a range of company-owned, line-of-business, and personal devices.

Users are constantly picking up and discarding devices. Solutions like VMware’s AirWatch and Citrix’s XenMobile mean you no longer need to manage security settings for each device; instead, you can configure one virtualized environment for one employee, and its settings will be applied regardless of which device it’s accessed from.

What are the benefits?

Beyond a centralized approach to device management and data access rights, virtualized MDM solutions allow you to enjoy a number of other benefits. For example, IT administrators can remotely lock or erase data on employee devices if the device has been lost or stolen.

You can also benefit from Single Sign-On security. This means your users need only one set of login credentials to access all their applications. Technically, each application will still use a different username and password, but your virtualized solution will securely store each of the credentials and automatically log in users whenever they sign in to your MDM platform.

Hardware and software are evolving so fast that it’s almost impossible to secure them without extensive IT training. With a little help from trained professionals, virtualization is one of the easiest and most cost-effective ways for business owners to simplify user settings and management.

It only makes sense that the next step would be unifying virtualized desktops, laptops, smartphones and other mobile devices under a single solution. Call us today to get started.